Posts by infocyte

White Paper: The Breach Detection Gap And Strategies To Close It

breach detection gap white paper

This white paper examines why adversaries are successful in persisting in networks; the limitations of existing security technologies and methodologies to discover threats once they are inside; and how dedicated hunt technology and processes can work with your existing security infrastructure to deny attackers the ability to persist undetected.

Read More

Webinar: 3 Challenges of Threat Hunting Using Endpoint Detection (EDR) Tools

In this webinar, threat hunter Chris Gerritz looks at the pitfalls of relying on Endpoint Detection (EDR) software as a substitute for proactive threat hunting, and examine some of the common misconceptions. He will also show how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, big data or experts.

Read More

Webinar: 3 Challenges of Threat Hunting Using Log Analysis

This webinar provides an in-depth look at the challenges of using Log Analysis for threat hunting and examines some of the common misconceptions (i.e. you “can’t” hunt without logs and massive infrastructure investments are a prerequisite). It also shows how FSA arms security practitioners with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, big data, and/or threat hunting experts.

Read More

Webinar: Forensic State Analysis – A New Approach to Threat Hunting

In this webinar, threat hunters from the SANS Institute and Infocyte discuss how to adapt Digital Forensics & Incident Response (DFIR) techniques to proactively hunt for unknown threats across an entire enterprise network — at scale. This approach is called Forensic State Analysis (FSA). Ultimately, FSA arms threat hunters with an effective and efficient methodology to hunt without relying solely on sophisticated security infrastructure, sensors, or big data.

Read More

Security Brief: Africa, Technology And The Threat Of Malware

africa threat malware cybersecurity

The rapid expansion of IT connectivity and businesses in Africa has led to the continent becoming a high value target for cyber-attacks of all kinds. This brief looks at the security challenges facing the region, as well as solutions to put proactive security practices in place to mitigate cyber threats in African countries.

Read More

Security Brief: Top Concerns Of Security Operations Centers (SOCs)

security operations center soc

A recent Threat Hunting Report published by Crowd Research Partners indicated while 75% of respondents believe that threat hunting is of major importance, and 42% consider it a top priority, there are specific concerns that stand out. This security brief looks at the top 7 concerns of Security Operations Center (SOC) managers reported and shows how threat hunting with Infocyte HUNT helps to address these issues.

Read More